This paper addresses the theory and reality of Wireless LAN security. It provides an overview of security mechanisms and explains how security works in Wireless LAN networks. An in depth analysis of the Wired Equivalent Privacy (WEP), Wi-Fi protected access (WPA) and WPA2 standards is presented. The security vulnerabilities that exist in them are analysed and explained. In the investigation, a wardriving approach is used. It is observed that about 30% of all WLANs detected during network discovery experiment operate with WEP encryption witch further investigated is proved that can be compromised with 100% success. The author discusses the potential consequences that arise from using a weak encryption. Experimental results of penetrating WPA secured network illustrate how easy it is to protect from dictionary attacks by simply using a combination of strong encryption protocol and complex key. The results of the practical part of the project are used to generate guideline in terms of choosing the right encryption method.
Table of Contents
1. INTRODUCTION
1.1 AIM AND OBJECTIVES
1.1.1 Aim
1.1.2 Objectives
2. LITERATURE REVIEW
2.1 WIRELESS LOCAL AREA NETWORK
2.1.1 Wireless LAN Security
2.2. WEP – WIRED EQUIVALENT PRIVACY
2.2.1 WEP Security Analysis
2.2.2 How WEP works
2.2.3 Conclusion
2.3. WPA/WPA2 – WI-FI PROTECTED ACCESS
2.3.1 WPA/WPA2 Security Analysis
2.3.2 How WPA works
2.3.3 How WPA2 works
2.3.4 Conclusion
2.4. SSID – SERVICE SET IDENTIFIER
2.5. MAC FILTERING
2.6. VPN – VIRTUAL PRIVATE NETWORKS
2.7. WIRELESS LAN ATTACKS
2.7.1 Passive Attacks
2.7.1.1 Replay Attack
2.7.1.2 Eavesdropping
2.7.1.3 Brute force attacks
2.7.1.4 Statistical attacks
2.7.2 Active Attacks
2.7.2.1 Denial of Service
2.7.2.2 Man in the Middle
3. METHODOLOGY
3.1 RESEARCH METHODOLOGY
3.2 EXPERIMENTAL METHODOLOGY
3.3 PLANNING AND MONITORING
3.4 RISK ASSSESMENT
3.5 CONCLUSION
4. WIRELESS NETWORK SECURITY SURVEY: WARDRIVE
4.1 INTRODUCTION
4.2 METHODOLOGY
4.3 FINDINGS
4.4 RESULTS
4.5 CONCLUSION
5. WIRELESS LAN PENETRATION TESTS
5.1 INTRODUCTION
5.2 METHODOLOGY
5.3 CRACKING WEP PASSWORD
5.3.1 Results
5.3.2 Conclusion
5.4 CRACKING WPA PASSWORD
5.4.1 Results
5.4.2 Conclusion
6. RECOMMENDATIONS
7. PROJECT EVALUATION
7.1 EVALUATION OF THE OBJECTIVES
7.2 EVALUATION OF THE METHODOLOGY
7.3 REFLECTION
8. REFERENCES
9. APPENDICES
9.1 Appendix A: Gantt Chart
9.2 Appendix B: Cracking WEP Password: Initial experimentation
9.3 Appendix C: Cracking WEP Password: Final experimentation
9.4 Appendix D: Cracking WPA Password
9.5 Appendix E: Diagram: WEP Step by step
9.6 Appendix F: Project Definition Report
9.7 Appendix G: Project Review Report
Objectives and Research Themes
This paper aims to analyze the current state of Wireless LAN security by investigating common vulnerabilities and demonstrating the effectiveness of various encryption standards through practical experimentation. The project seeks to raise awareness of security risks and provide actionable guidance for network managers.
- Researching existing security mechanisms in Wireless LAN networks (WEP, WPA, WPA2).
- Evaluating the security levels of local networks using the "wardriving" technique.
- Conducting controlled penetration tests to demonstrate how easily weak encryptions can be compromised.
- Comparing the performance and security implications of different password strategies and encryption protocols.
Excerpt from the book
1. INTRODUCTION
A decade ago hardly anyone heard of wireless internet. Today, however, the IT technology is mostly based on the wireless connection followed by the development of wireless network-enabled devices (Cache and Liu, 2010). The manufacturers of the speed network equipment generate billions of pounds, yet a worldwide usage carries a number of risks costing their business staggering amount of money and resources. In Wireless Local Area Networks (WLAN) major issues are associated with the security problems. The wireless signal of the WLAN is broadcast through the air in all directions simultaneously. An unauthorized user can easily capture this signal using freeware tools to exploit WLAN vulnerability. WLANs are increasingly used within home and business environment due to the convenience, mobility, and affordable prices for wireless devices. WLAN gives mobility and flexibility to users in homes and hot spot environments, such as airports and campuses. The wide range of usage emphasises the importance of having a secure network and protect from potential break ins. In order to do so, mostly encryptions such as WEP and WPA/WPA2 are used (Kizza, 2011). This allows the transmitted data within the network to be encrypted. Nevertheless, the fact that information is said to be encrypted, does not necessarily mean the hacking specialists can access it (Cache and Liu, 2010).
Wireless LAN networks are generally designed with emphasis on convenience rather than security. This is exactly where the problem lies. On a wireless network almost anyone with a WLAN enabled device can easily connect to and penetrate other users systems (Misic, 2008), thus research based and findings will illustrate just how easy it is to protect from malicious attacks by simply using a combination of strong encryption protocol and complex key. The author discusses the potential consequences that arise from using a weak encryption. In order to explore further the findings and results of this study a wardriving test has been conducted to critically assess the issues associated with security and to examine its current level.
Summary of Chapters
1. INTRODUCTION: Provides an overview of the rise of wireless technology and the inherent security risks associated with broadcasting data over the air.
2. LITERATURE REVIEW: Explains the technical foundations of 802.11 standards and analyzes the vulnerabilities of WEP, WPA, and WPA2 encryption protocols.
3. METHODOLOGY: Outlines the comparative and experimental approaches used to test security and highlights the tools required for penetration testing.
4. WIRELESS NETWORK SECURITY SURVEY: WARDRIVE: Documents the results of a real-world wardriving experiment conducted in Southampton to assess the prevalence of insecure access points.
5. WIRELESS LAN PENETRATION TESTS: Details the practical experiments involving the cracking of WEP and WPA passwords to illustrate how easily security can be breached.
6. RECOMMENDATIONS: Offers best practices for securing wireless networks, including firmware updates, password complexity, and the use of VPNs.
7. PROJECT EVALUATION: Reflects on the project's objectives, methodology, and the challenges faced during implementation, such as hardware compatibility and Linux complexity.
Keywords
Wireless LAN Security, WEP, WPA, WPA2, Encryption, Penetration Testing, Wardriving, Network Vulnerabilities, Cybersecurity, Brute Force, Dictionary Attack, MAC Filtering, SSID, TKIP, AES.
Frequently Asked Questions
What is the primary focus of this paper?
The paper focuses on analyzing the theoretical and practical aspects of Wireless LAN security, specifically examining how common encryption protocols like WEP and WPA can be compromised.
What are the central themes covered in this research?
The core themes include the analysis of wireless network security, the identification of vulnerabilities in 802.11 standards, and the practical implementation of hacking techniques for educational purposes.
What is the primary goal of the project?
The main objective is to assess the security of modern wireless networks and provide guidance to administrators on how to mitigate risks and improve network protection.
Which scientific methodology is utilized?
The project employs a comparative approach, combining a thorough literature review with hands-on experimental research using Linux-based tools like the Aircrack-ng suite.
What is discussed in the main part of the report?
The main part covers the historical context of wireless security, detailed analyses of WEP/WPA vulnerabilities, a wardriving survey, and step-by-step penetration testing procedures.
Which keywords best characterize this work?
Key terms include WLAN security, penetration testing, wardriving, encryption, and password management.
How did the author perform the wardriving experiment?
The author used the software "inSSIDer" in a car to map the security status of access points in the Southampton area, allowing for a statistical analysis of encryption usage.
Why are WEP and WPA considered vulnerable compared to WPA2?
WEP uses weak algorithms like RC4 with static keys, while early WPA implementations also shared flaws. WPA2, particularly with AES, is currently considered much more robust against the discussed cracking methods.
What role does the Linux operating system play in this project?
Linux, specifically the BackTrack distribution, provided the specialized toolsets necessary for packet injection and network auditing that are not easily accessible on Windows platforms.
- Quote paper
- Tomasz Halapacz (Author), 2011, The Theory and Reality of Wireless LAN Security, Munich, GRIN Verlag, https://www.grin.com/document/178977